← Back to Baseline

Why it Matters

Many extension developers publish advisories outside OSV or CVE databases — for example on GitHub Security Advisories, vendor blogs, or private mailing lists. If these advisories are ignored, your store may run code with known issues even though no CVE entry exists yet.

Regularly checking vendor advisories ensures you catch important security fixes early, sometimes before an official CVE is issued. This proactive approach reduces the attack window and keeps third-party code aligned with best practices.

Verification Steps

Manual check

# For each extension, visit the vendor GitHub or website
# Check CHANGELOG.md or SECURITY.md
# Look for announcements of security patches

Automation option

# Use GitHub's dependabot or security alerts
# Monitor vendor RSS feeds or subscribe to mailing lists

Remediation / Fix Guidance

  1. Track all vendors whose extensions are installed in your store.
  2. Subscribe to their security advisories (GitHub advisories, newsletters, blogs).
  3. When an advisory is published:
    • Check if your version is affected.
    • Update to the patched version immediately if available.
    • If no fix exists, disable or replace the module.
  4. Document advisories and remediation steps for audit purposes.

Examples

Fail Example
# Vendor released advisory: SQL Injection fixed in v2.1.5
# Store is still running v2.1.3 with no patch applied
# Advisory ignored → FAIL
Pass Example
# Vendor advisory published 2025-02-01
# Store upgraded to patched version v2.1.5
# Advisory applied quickly → PASS

References